SG11202006235QA - Multi-approval system using m of n keys to restore a customer wallet - Google Patents

Multi-approval system using m of n keys to restore a customer wallet

Info

Publication number
SG11202006235QA
SG11202006235QA SG11202006235QA SG11202006235QA SG11202006235QA SG 11202006235Q A SG11202006235Q A SG 11202006235QA SG 11202006235Q A SG11202006235Q A SG 11202006235QA SG 11202006235Q A SG11202006235Q A SG 11202006235QA SG 11202006235Q A SG11202006235Q A SG 11202006235QA
Authority
SG
Singapore
Prior art keywords
restore
keys
approval system
customer wallet
wallet
Prior art date
Application number
SG11202006235QA
Inventor
Tron Black
Denny Becker
Original Assignee
Medici Ventures Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Medici Ventures Inc filed Critical Medici Ventures Inc
Publication of SG11202006235QA publication Critical patent/SG11202006235QA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/384Payment protocols; Details thereof using social networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/381Currency conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG11202006235QA 2018-01-17 2019-01-17 Multi-approval system using m of n keys to restore a customer wallet SG11202006235QA (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201862618077P 2018-01-17 2018-01-17
US201862663922P 2018-04-27 2018-04-27
US201862663921P 2018-04-27 2018-04-27
US201862780779P 2018-12-17 2018-12-17
PCT/US2019/014063 WO2019143849A1 (en) 2018-01-17 2019-01-17 Multi-approval system using m of n keys to restore a customer wallet

Publications (1)

Publication Number Publication Date
SG11202006235QA true SG11202006235QA (en) 2020-07-29

Family

ID=67212968

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11202006235QA SG11202006235QA (en) 2018-01-17 2019-01-17 Multi-approval system using m of n keys to restore a customer wallet
SG11202006282QA SG11202006282QA (en) 2018-01-17 2019-01-17 Multi-approval system using m of n keys to generate a transaction address

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG11202006282QA SG11202006282QA (en) 2018-01-17 2019-01-17 Multi-approval system using m of n keys to generate a transaction address

Country Status (6)

Country Link
US (5) US11392940B2 (en)
EP (4) EP3740923B1 (en)
JP (3) JP7269944B2 (en)
KR (2) KR20200104413A (en)
SG (2) SG11202006235QA (en)
WO (4) WO2019143850A1 (en)

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11055707B2 (en) * 2014-06-24 2021-07-06 Visa International Service Association Cryptocurrency infrastructure system
WO2017145010A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US11308486B2 (en) 2016-02-23 2022-04-19 nChain Holdings Limited Method and system for the secure transfer of entities on a blockchain
EP3420669B1 (en) 2016-02-23 2021-03-24 Nchain Holdings Limited Cryptographic method and system for secure extraction of data from a blockchain
EP3420675B1 (en) 2016-02-23 2020-03-11 Nchain Holdings Limited Blockchain implemented counting system and method for use in secure voting and distribution
BR112018016822A2 (en) 2016-02-23 2018-12-26 Nchain Holdings Ltd computer-implemented method for performing an entity exchange between a first user and a second user, processor, and computer readable medium
WO2017145019A1 (en) 2016-02-23 2017-08-31 nChain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
EP3748903A1 (en) 2016-02-23 2020-12-09 Nchain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
JP6942136B2 (en) 2016-02-23 2021-09-29 エヌチェーン ホールディングス リミテッドNchain Holdings Limited How to be implemented by the blockchain for the control and distribution of digital content
JP6528008B2 (en) 2016-02-23 2019-06-12 エヌチェーン ホールディングス リミテッドNchain Holdings Limited Personal Device Security Using Elliptic Curve Cryptography for Secret Sharing
LT3268914T (en) 2016-02-23 2018-11-12 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
EP3420507A1 (en) 2016-02-23 2019-01-02 Nchain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
BR112018016819A2 (en) 2016-02-23 2018-12-26 Nchain Holdings Ltd method and systems for protecting a controlled digital resource using a distributed scatter table and ledger and a blockchain
BR112018016782A2 (en) 2016-02-23 2018-12-26 Nchain Holdings Ltd computer-implemented system and method configured to control a blockchain transfer
US11126976B2 (en) 2016-02-23 2021-09-21 nChain Holdings Limited Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
JP6721832B2 (en) * 2016-08-24 2020-07-15 富士通株式会社 Data conversion program, data conversion device, and data conversion method
KR101849918B1 (en) * 2016-10-26 2018-04-19 주식회사 코인플러그 Method for issuing and paying money in use of unspent transaction output based protocol, and server using the same
US20200313856A1 (en) * 2019-03-29 2020-10-01 0Chain, LLC Systems and methods of blockchain platform for intermediaries and passwordless login
US11625711B2 (en) * 2018-04-24 2023-04-11 Duvon Corporation Autonomous exchange via entrusted ledger key management
US11164182B2 (en) * 2018-05-17 2021-11-02 Conio Inc. Methods and systems for safe creation, custody, recovery, and management of a digital asset
US10834095B2 (en) * 2018-05-17 2020-11-10 International Business Machines Corporation Post-commit validation in a distributed ledger
WO2020008658A1 (en) * 2018-07-03 2020-01-09 スタンダードトランザクション株式会社 Currency information processing device and currency information processing system
US10970685B2 (en) 2018-07-12 2021-04-06 Capital One Services, Llc Electronic funds transfers based on automatic cryptocurrency transactions
CN109194465B (en) * 2018-09-30 2022-02-18 巍乾全球技术有限责任公司 Method for managing keys, user equipment, management device and storage medium
GB201820947D0 (en) * 2018-12-21 2019-02-06 Nchain Holdings Ltd Computer-implemented system and method
JP2022065210A (en) * 2019-02-26 2022-04-27 株式会社AndGo Apparatus for evacuating encrypted currency, method thereof, and program therefor
US11763275B2 (en) * 2019-03-05 2023-09-19 Coinbase, Inc. System and method for cryptocurrency point of sale
US11151525B2 (en) * 2019-03-05 2021-10-19 Coinbase, Inc. Systems and methods for withdrawal consolidation
US11068863B2 (en) * 2019-04-04 2021-07-20 Capital One Services, Llc Systems and methods of pending transaction augmentation and automatic attachment to settled transactions
US11741082B2 (en) * 2019-05-02 2023-08-29 Capital One Services, Llc Systems and methods for automated recovery of blockchain-based accounts
US11676143B2 (en) 2019-05-16 2023-06-13 Coinbase, Inc. Systems and methods for blockchain transaction management
SG11202113362XA (en) 2019-06-10 2021-12-30 Tzero Ip Llc Key recovery using encrypted secret shares
GB2585010B (en) * 2019-06-24 2022-07-13 Blockstar Developments Ltd Cryptocurrency key management
US10790990B2 (en) * 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
US11222011B2 (en) * 2019-06-28 2022-01-11 Advanced New Technologies Co., Ltd. Blockchain-based transaction processing
JP7041650B2 (en) * 2019-07-31 2022-03-24 株式会社Sbi Bits System for recreating private keys
US11233658B2 (en) * 2019-08-14 2022-01-25 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys
FR3100678B1 (en) * 2019-09-09 2022-01-14 Commissariat Energie Atomique GENERATION OF A CONTEXTUAL MULTI-USER PRIVATE KEY WALLET AND USE OF SUCH WALLET
GB2587202A (en) * 2019-09-17 2021-03-24 Nchain Holdings Ltd Allocation of a digital asset using blockchain transactions
US11546321B2 (en) 2019-09-24 2023-01-03 Magic Labs, Inc. Non-custodial tool for building decentralized computer applications
GB201914950D0 (en) * 2019-10-16 2019-11-27 Centbee Pty Ltd Computer-implemented systems and methods
US11303443B2 (en) * 2019-11-12 2022-04-12 Gbti Solutions Electronic system to enable rapid acquisition and delivery of services and to provide strong protection of security and privacy
EP4062350A4 (en) 2019-11-22 2024-03-06 Conio Inc. Method and apparatus for a blockchain-agnostic safe multi-signature digital asset management
CN111010379B (en) * 2019-12-04 2022-08-09 腾讯科技(深圳)有限公司 Data login method and device based on block chain network
GB2594231A (en) * 2019-12-24 2021-10-27 Nchain Holdings Ltd Mapping keys to a blockchain overlay network
US11775986B1 (en) * 2020-05-12 2023-10-03 Coupa Software Incorporated Secure facilitation of virtual card activities for procurement
DE102020004116A1 (en) * 2020-07-08 2022-01-13 Giesecke+Devrient Gesellschaft mit beschränkter Haftung ISSUING AUTHORITY AND PROCEDURE FOR ISSUING ELECTRONIC COIN DATA RECORDS AND PAYMENT SYSTEM
DE102020004121A1 (en) * 2020-07-08 2022-01-13 Giesecke+Devrient Gesellschaft mit beschränkter Haftung METHOD, SUBSCRIBER UNIT, TRANSACTION REGISTER AND PAYMENT SYSTEM FOR ADMINISTRATION OF TRANSACTION RECORDS
US20220027867A1 (en) * 2020-07-27 2022-01-27 Avanti Financial Group, Inc. Cryptographic token with separate circulation groups
US11394550B2 (en) * 2020-07-30 2022-07-19 Dapper Labs Inc. Systems and methods providing specialized proof of confidential knowledge
CN111815454B (en) * 2020-08-21 2020-12-11 支付宝(杭州)信息技术有限公司 Data uplink method and device, electronic equipment and storage medium
US20220076251A1 (en) * 2020-09-08 2022-03-10 Joseph D. Hughes Payment card enabled distributed digital ledger system to handle security of both crypto and non-crypto transactions
JP2022055060A (en) * 2020-09-28 2022-04-07 富士通株式会社 Communication program, communication device, and communication method
CN112131316B (en) * 2020-11-20 2021-02-12 腾讯科技(深圳)有限公司 Data processing method and device applied to block chain system
GB202018919D0 (en) * 2020-12-01 2021-01-13 Smarter Contracts Ltd Consent Management
TWI774211B (en) * 2021-01-25 2022-08-11 安瀚科技股份有限公司 Expandable binding type electronic wallet system
KR102520066B1 (en) * 2021-02-22 2023-04-10 주식회사 블록체인기술연구소 The private key management and recovery system that storing distributed the key backup data
US11461084B2 (en) * 2021-03-05 2022-10-04 EMC IP Holding Company LLC Optimizing docker image encryption—kubernetes using shamir secrets to enforce multiple constraints in container runtime environment
US20220300922A1 (en) * 2021-03-22 2022-09-22 Quant Blockchain Banking Solutions Llc System and method to management a cryptographic banking network
GB2609906B (en) * 2021-08-09 2023-12-27 Nchain Licensing Ag Generating digital signature shares
CA3180859A1 (en) * 2021-11-02 2023-05-02 Evite, Inc. Purchase and transfer of cryptocurrency without preexisting wallets
WO2023154419A2 (en) * 2022-02-09 2023-08-17 Thirdwayv, Inc. Access control systems and methods for cryptowallets
FI20225761A1 (en) * 2022-08-31 2024-03-01 Elisa Oyj Method and system for securely managing private wallet
CN116032655B (en) * 2023-02-13 2023-07-25 杭州天谷信息科技有限公司 Identity authentication method and system capable of resisting timing attack

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6457021B1 (en) 1998-08-18 2002-09-24 Microsoft Corporation In-memory database system
EP1183816A4 (en) * 1999-05-26 2005-09-14 Ascom Hasler Mailing Sys Inc Technique for split knowledge backup and recovery of a cryptographic key
JP2001344537A (en) 2000-05-31 2001-12-14 Ntt Docomo Inc Electronic value system, communication terminal and server
US6950523B1 (en) 2000-09-29 2005-09-27 Intel Corporation Secure storage of private keys
US8989390B2 (en) * 2005-12-12 2015-03-24 Qualcomm Incorporated Certify and split system and method for replacing cryptographic keys
FR2914408B1 (en) 2007-03-29 2009-08-21 Eric Cognard TRANSPORT AND / OR STORAGE DEVICE HAVING DOUBLE-WALL INSULATING BULB
WO2009009788A1 (en) 2007-07-12 2009-01-15 Jobmann Brian C Identity authentication and secured access systems, components, and methods
WO2009076653A1 (en) 2007-12-13 2009-06-18 Pgp Corporation Apparatus and method for processing fragmented cryptographic keys
US9077537B2 (en) 2008-11-13 2015-07-07 International Business Machines Corporation Generating secure private keys for use in a public key communications environment
US8769304B2 (en) 2011-06-16 2014-07-01 OneID Inc. Method and system for fully encrypted repository
US10354325B1 (en) * 2013-06-28 2019-07-16 Winklevoss Ip, Llc Computer-generated graphical user interface
WO2015142765A1 (en) * 2014-03-17 2015-09-24 Coinbase, Inc Bitcoin host computer system
US20150269538A1 (en) 2014-03-18 2015-09-24 Darin Stanchfield Security devices and systems for digital currency transfer
US9672499B2 (en) 2014-04-02 2017-06-06 Modernity Financial Holdings, Ltd. Data analytic and security mechanism for implementing a hot wallet service
WO2015183497A1 (en) 2014-05-06 2015-12-03 Case Wallet, Inc. Cryptocurrency virtual wallet system and method
EP3073670B1 (en) * 2015-03-27 2020-09-02 Black Gold Coin, Inc. A system and a method for personal identification and verification
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US10868672B1 (en) 2015-06-05 2020-12-15 Apple Inc. Establishing and verifying identity using biometrics while protecting user privacy
US11488147B2 (en) 2015-07-14 2022-11-01 Fmr Llc Computationally efficient transfer processing and auditing apparatuses, methods and systems
CA2992458A1 (en) 2015-07-14 2017-01-19 Fmr Llc Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems
EP3384448B1 (en) * 2015-11-30 2020-10-14 Shapeshift AG Systems and methods for improving security in blockchain-asset exchange
US9954680B1 (en) 2015-12-18 2018-04-24 EMC IP Holding Company LLC Secure management of a master encryption key in a split-key based distributed computing environment
US9613221B1 (en) 2015-12-30 2017-04-04 Quixey, Inc. Signed application cards
CN116843334A (en) 2016-02-23 2023-10-03 区块链控股有限公司 Combined data transmission control method and system based on block chain
US9853813B2 (en) 2016-03-17 2017-12-26 Crater Dog Technologies, LLC Method for securing a private key
GB201607476D0 (en) 2016-04-29 2016-06-15 Eitc Holdings Ltd Operating system for blockchain IOT devices
US10333705B2 (en) 2016-04-30 2019-06-25 Civic Technologies, Inc. Methods and apparatus for providing attestation of information using a centralized or distributed ledger
GB2538022B (en) 2016-08-20 2018-07-11 PQ Solutions Ltd Multiple secrets in quorum based data processing
EP3507701B1 (en) * 2016-09-02 2022-05-18 Conio Inc. Method and apparatus for restoring access to digital assets
US20180089760A1 (en) * 2016-09-26 2018-03-29 Shapeshift Ag System and method of providing a multi-asset rebalancing mechanism
US11222324B2 (en) 2016-10-10 2022-01-11 Paypal, Inc. Virtual currency secured physical currency transmission system
US20180293557A1 (en) 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. Method of charging electronic currency automatically based on blockchain and system thereof
GB201705621D0 (en) * 2017-04-07 2017-05-24 Nchain Holdings Ltd Computer-implemented system and method
JP2020517135A (en) 2017-04-11 2020-06-11 エヌチェーン ホールディングス リミテッドNchain Holdings Limited Secure transfer between blockchains
US10805072B2 (en) 2017-06-12 2020-10-13 Change Healthcare Holdings, Llc System and method for autonomous dynamic person management
SG10201705618VA (en) * 2017-07-07 2019-02-27 Mastercard Asia Pacific Pte Ltd A system and method for utilizing secondary user biometric data for user authorisation
US10715504B2 (en) * 2017-07-12 2020-07-14 Wickr Inc. Provisioning ephemeral key pools for sending and receiving secure communications
US20190057368A1 (en) * 2017-08-18 2019-02-21 Interact Ventures Electronically warehousing items of stored value
KR20200091882A (en) * 2017-11-22 2020-07-31 솔트 블락체인 인코포레이티드 Incremental digital asset collateral wallet
CN112636907B (en) 2020-12-18 2023-04-18 深圳前海微众银行股份有限公司 Key management method, key using method, device and equipment

Also Published As

Publication number Publication date
EP3740919A1 (en) 2020-11-25
WO2019143852A1 (en) 2019-07-25
KR20200104412A (en) 2020-09-03
JP7351591B2 (en) 2023-09-27
JP2021511596A (en) 2021-05-06
US11531985B2 (en) 2022-12-20
EP3740920A1 (en) 2020-11-25
US20220084022A1 (en) 2022-03-17
US20190220857A1 (en) 2019-07-18
WO2019143849A1 (en) 2019-07-25
SG11202006282QA (en) 2020-07-29
US20190220859A1 (en) 2019-07-18
EP3740921A4 (en) 2021-11-10
WO2019143850A1 (en) 2019-07-25
JP2023169246A (en) 2023-11-29
JP2021511595A (en) 2021-05-06
EP3740923C0 (en) 2023-07-05
US11429959B2 (en) 2022-08-30
EP3740923A1 (en) 2020-11-25
EP3740919A4 (en) 2021-11-10
US20190220858A1 (en) 2019-07-18
EP3740920A4 (en) 2021-10-20
US11392940B2 (en) 2022-07-19
WO2019143853A1 (en) 2019-07-25
KR20200104413A (en) 2020-09-03
EP3740921A1 (en) 2020-11-25
EP3740923A4 (en) 2021-11-10
EP3740923B1 (en) 2023-07-05
US20190220852A1 (en) 2019-07-18
JP7269944B2 (en) 2023-05-09
US11216809B2 (en) 2022-01-04

Similar Documents

Publication Publication Date Title
SG11202006235QA (en) Multi-approval system using m of n keys to restore a customer wallet
ZA202002877B (en) Using telematics data to identify a type of a trip
GB201711353D0 (en) Improvements relating to face recognition
SG11201703507PA (en) Compact head-mounted display system protected by a hyperfine structure
EP3248165A4 (en) Transaction utilizing anonymized user data
SG10201510742SA (en) A Method For Adding A New Product Functionality To A Customer's Digital Card
AU201811021S (en) Watch case
PL3238621T3 (en) Wearable step counter system
DK3154666T3 (en) CAPILLAR PRESSURE RECOVERY MECHANISM AND USES
SG11202001865XA (en) Access to ach transaction functionality via digital wallets
EP3788438A4 (en) System for securing eyewear to a user or object
GB201801761D0 (en) A secure transaction system
IL277099A (en) System for displaying information to a user
IL267528A (en) Prolific flowering watermelon
GB201506367D0 (en) Methods and systems to separate wavefields using pressure wavefield data
IL266901B (en) Control station for outputting information relating to a multiplicity of infusion systems to a user
GB201811554D0 (en) Method and system for supplying one or more physical items to a user
PL3609939T3 (en) Low-voc polyurethane adhesive
GB201713732D0 (en) Tat expression system
LT3098558T (en) A protection panel for adiabatic pre cooling system
GB201820128D0 (en) Improvements to user interaction system
GB2571778B (en) Improvements in or relating to handbag location systems
CA185405S (en) Wallet
GB2557408B (en) Improvements to a clock
GB201819127D0 (en) Improvement to a fixing